Sitecore Experience Platform Exploit Chain Enabling Remote Code Execution
Summary
Hide β²
Show βΌ
An exploit chain has been identified in the Sitecore Experience Platform, combining cache poisoning and remote code execution vulnerabilities. The chain leverages four new flaws (CVE-2025-53693, CVE-2025-53691, CVE-2025-53694, CVE-2025-53690) to achieve unauthorized access and code execution. The exploit chain involves HTML cache poisoning through unsafe reflections and insecure deserialization, potentially leading to full compromise of Sitecore instances. The vulnerabilities were disclosed by watchTowr Labs and patches were released by Sitecore in June and July 2025. Additionally, a new zero-day vulnerability (CVE-2025-53690) was exploited by threat actors to deliver malware and perform extensive internal reconnaissance. The attackers targeted the '/sitecore/blocked.aspx' endpoint to achieve remote code execution and executed reconnaissance commands including whoami, hostname, tasklist, ipconfig /all, and netstat -ano. The vulnerability is a ViewState deserialization flaw under active exploitation in the wild, affecting several Sitecore products including Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. The attack leveraged a sample machine key that had been exposed in Sitecore deployment guides from 2017 and earlier. CISA has ordered immediate patching of the vulnerability by September 25, 2025. The wider impact of the vulnerability has not yet surfaced, but it is expected to do so.
Timeline
-
05.09.2025 19:08 π° 1 articles Β· β± 11d ago
CISA orders immediate patching of CVE-2025-53690 by September 25, 2025
CISA has ordered immediate patching of the vulnerability by September 25, 2025. The vulnerability arises from the use of a static ASP.NET machine key that was publicly disclosed in product documentation. Sitecore has confirmed that new deployments now generate keys automatically and that all affected customers have been contacted. The blast radius of the vulnerability remains unknown, but it exhibits characteristics of severe vulnerabilities. The wider impact of the vulnerability has not yet surfaced, but it is expected to do so.
Show sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
05.09.2025 01:05 π° 1 articles Β· β± 11d ago
Mandiant disrupts active exploitation of CVE-2025-53690
Mandiant Threat Defense successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments. The attack leveraged a sample machine key exposed in older Sitecore deployment guides. The disruption prevented the full attack cycle from being observed, but it highlights the ongoing risk of ViewState attacks.
Show sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
-
04.09.2025 11:46 π° 4 articles Β· β± 12d ago
Threat actors exploit CVE-2025-53690 to deliver WeepSteel malware
The attack was disrupted by Mandiant Threat Defense, preventing the full attack cycle from being observed. The article discusses the broader context of ViewState vulnerabilities, including recent attacks on other platforms and the potential for maintaining persistence on compromised servers. The /sitecore/blocked.aspx page is a legitimate Sitecore component that can be exploited for deserialization attacks. The attackers demonstrated a deep understanding of the compromised product and the exploited vulnerability. The attackers progressed from initial server compromise to privilege escalation. The attackers used the vulnerability to achieve initial compromise of the internet-facing Sitecore instance. The attackers deployed a combination of open-source and custom tools to facilitate reconnaissance, remote access, and Active Directory reconnaissance.
Show sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
29.08.2025 20:22 π° 4 articles Β· β± 18d ago
Exploit chain in Sitecore Experience Platform disclosed
The exploit chain affects several Sitecore products, including Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. The vulnerability is a ViewState deserialization flaw under active exploitation in the wild. The attack leveraged a sample machine key that had been exposed in Sitecore deployment guides from 2017 and earlier. The attackers used WEEPSTEEL malware, which borrows functionality from ExchangeCmdPy.py. The attackers created local administrator accounts named asp$ and sawadmin. The attackers dumped SAM/SYSTEM hives to obtain administrator credentials. The attackers used EarthWorm for network tunneling, DWAgent for persistent remote access, and SharpHound for Active Directory reconnaissance. The attackers used GoTokenTheft for token impersonation and command execution. The attackers removed previously created accounts after compromising other admin users. The attackers used Remote Desktop Protocol (RDP) for lateral movement. The attackers established a foothold, escalated privileges, maintained persistence, and conducted internal network reconnaissance. The attackers leveraged the vulnerability to deploy open-source and custom tools for reconnaissance, remote access, and Active Directory reconnaissance.
Show sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
Information Snippets
-
CVE-2025-53693 allows HTML cache poisoning through unsafe reflections.
First reported: 29.08.2025 20:22π° 2 sources, 3 articlesShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
CVE-2025-53691 enables remote code execution (RCE) through insecure deserialization.
First reported: 29.08.2025 20:22π° 4 sources, 5 articlesShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
CVE-2025-53694 leads to information disclosure via the ItemService API, exposing cache keys.
First reported: 29.08.2025 20:22π° 2 sources, 3 articlesShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The exploit chain involves enumerating HTML cache keys and sending HTTP cache poisoning requests.
First reported: 29.08.2025 20:22π° 1 source, 2 articlesShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The chain culminates in code execution via an unrestricted BinaryFormatter call.
First reported: 29.08.2025 20:22π° 2 sources, 3 articlesShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
Patches for these vulnerabilities were released in June and July 2025.
First reported: 29.08.2025 20:22π° 1 source, 1 articleShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
-
The exploit chain can compromise fully-patched Sitecore Experience Platform instances.
First reported: 29.08.2025 20:22π° 1 source, 1 articleShow sources
- Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution β thehackernews.com β 29.08.2025 20:22
-
A new vulnerability, CVE-2025-53690, affects Sitecore Experience Manager (XM) and Experience Platform (XP) prior to version 9.0.
First reported: 04.09.2025 11:46π° 4 sources, 4 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
CVE-2025-53690 is a deserialization of untrusted data bug with a CVSS score of 9.0.
First reported: 04.09.2025 11:46π° 4 sources, 4 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The vulnerability stems from the use of a sample machine key included in Sitecore deployment guides from 2017 and earlier.
First reported: 04.09.2025 11:46π° 4 sources, 4 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The WeepSteel malware was used in the attacks to enable internal reconnaissance.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
Attackers archived the root directory of the web application to obtain sensitive files.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
Open-source tools such as EarthWorm, DWagent, and SharpHound were deployed for network tunneling, remote access, and AD reconnaissance.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers created local administrator accounts and established Remote Desktop Protocol (RDP) access.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The SYSTEM and SAM registry hives were dumped to extract password hashes for local users.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The threat actor maintained persistence through a combination of methods, including disabling password expiration for administrative accounts.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers deleted created accounts after compromising other admin users and performed internal reconnaissance.
First reported: 04.09.2025 11:46π° 3 sources, 3 articlesShow sources
- Hackers Exploit Sitecore Zero-Day for Malware Delivery β www.securityweek.com β 04.09.2025 11:46
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers targeted the '/sitecore/blocked.aspx' endpoint to achieve remote code execution.
First reported: 04.09.2025 21:51π° 3 sources, 3 articlesShow sources
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers executed reconnaissance commands including whoami, hostname, tasklist, ipconfig /all, and netstat -ano.
First reported: 04.09.2025 21:51π° 3 sources, 3 articlesShow sources
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used GoTokenTheft to attempt token impersonation.
First reported: 04.09.2025 21:51π° 2 sources, 2 articlesShow sources
- Hackers exploited Sitecore zero-day flaw to deploy backdoors β www.bleepingcomputer.com β 04.09.2025 21:51
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The zero-day vulnerability CVE-2025-53690 affects several Sitecore products including Experience Manager (XM), Experience Platform (XP), and Experience Commerce.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The vulnerability is a ViewState deserialization flaw under active exploitation in the wild.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attack leveraged a sample machine key that had been exposed in Sitecore deployment guides from 2017 and earlier.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attack was disrupted by Mandiant Threat Defense, preventing the full attack cycle from being observed.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
Microsoft warned about 3,000 publicly disclosed ASP.NET machine keys that could be weaponized for ViewState attacks.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The Sitecore attack is part of a series of ViewState attacks this year, including vulnerabilities in Gladinet's CentreStack, ConnectWise, and Microsoft SharePoint Server.
First reported: 05.09.2025 01:05π° 1 source, 1 articleShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
-
The /sitecore/blocked.aspx page is a legitimate Sitecore component that can be exploited for deserialization attacks.
First reported: 05.09.2025 01:05π° 2 sources, 2 articlesShow sources
- Sitecore Zero-Day Sparks New Round of ViewState Threats β www.darkreading.com β 05.09.2025 01:05
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
CVE-2025-53690 affects Sitecore Experience Commerce (XC) and Managed Cloud.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The vulnerability is being actively exploited in the wild.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The exploit chain involves the use of a sample machine key exposed in Sitecore deployment guides from 2017 and earlier.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used WEEPSTEEL malware, which borrows functionality from ExchangeCmdPy.py.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers created local administrator accounts named asp$ and sawadmin.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers dumped SAM/SYSTEM hives to obtain administrator credentials.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used EarthWorm for network tunneling, DWAgent for persistent remote access, and SharpHound for Active Directory reconnaissance.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used GoTokenTheft for token impersonation and command execution.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers removed previously created accounts after compromising other admin users.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used Remote Desktop Protocol (RDP) for lateral movement.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers established a foothold, escalated privileges, maintained persistence, and conducted internal network reconnaissance.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers leveraged the vulnerability to deploy open-source and custom tools for reconnaissance, remote access, and Active Directory reconnaissance.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
CISA has ordered immediate patching of the vulnerability by September 25, 2025.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The vulnerability arises from the use of a static ASP.NET machine key that was publicly disclosed in product documentation.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
Sitecore has confirmed that new deployments now generate keys automatically and that all affected customers have been contacted.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The blast radius of the vulnerability remains unknown, but it exhibits characteristics of severe vulnerabilities.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The wider impact of the vulnerability has not yet surfaced, but it is expected to do so.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers demonstrated a deep understanding of the compromised product and the exploited vulnerability.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers progressed from initial server compromise to privilege escalation.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers used the vulnerability to achieve initial compromise of the internet-facing Sitecore instance.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
-
The attackers deployed a combination of open-source and custom tools to facilitate reconnaissance, remote access, and Active Directory reconnaissance.
First reported: 05.09.2025 19:08π° 1 source, 1 articleShow sources
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation β thehackernews.com β 05.09.2025 19:08
Similar Happenings
Phoenix Rowhammer attack bypasses DDR5 Rowhammer defenses
A new Rowhammer attack variant, called Phoenix, bypasses the latest protection mechanisms on DDR5 memory chips from SK Hynix. This attack exploits vulnerabilities in the Target Row Refresh (TRR) mechanism to flip bits in memory, enabling privilege escalation and unauthorized access. The attack was developed by researchers at ETH Zurich University and Google, and it affects all DDR5 DIMM RAM modules produced between January 2021 and December 2024. The Phoenix attack can corrupt data, increase privileges, execute malicious code, or access sensitive data. It works by repeatedly accessing specific rows of memory cells to cause electrical interference, altering nearby bits. The attack is tracked as CVE-2025-6202 and has been assigned a high-severity score. The researchers demonstrated the attack's effectiveness by successfully flipping bits on all 15 DDR5 memory chips in their test pool, achieving root privileges in under two minutes. They also showed that the attack can break SSH authentication and alter system binaries to escalate local privileges. The researchers recommend increasing the refresh rate to 3x to mitigate the Phoenix attack.
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
Akira Ransomware Group Exploits SonicWall SSL VPN Flaws
The Akira ransomware group has been actively exploiting SonicWall SSL VPN flaws and misconfigurations to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting SonicWall devices to facilitate ransomware operations. The group leverages a combination of security vulnerabilities, including a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings, to bypass access controls and infiltrate networks. Organizations are advised to rotate passwords, remove unused accounts, enable multi-factor authentication, and restrict access to the Virtual Office Portal to mitigate risks. The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of SonicWall SSL VPNs and issued alerts about the increased exploitation of CVE-2024-40766.
Cursor AI editor autoruns malicious code in repositories
A flaw in the Cursor AI code editor allows malicious repositories to execute arbitrary code automatically when opened. This vulnerability can lead to malware installation, environment hijacking, and credential theft. Cursor, an AI-powered IDE based on Visual Studio Code, disables the Workspace Trust feature by default, allowing this behavior. The flaw affects one million users who generate over a billion lines of code daily. Cursor developers have decided not to fix the issue, citing the need to maintain AI and other features. The vulnerability is part of a broader trend of prompt injections and jailbreaks affecting AI-powered coding and reasoning agents, which can embed malicious instructions to perform harmful actions or leak data.
Microsoft September 2025 Patch Tuesday fixes 81 vulnerabilities, including two zero-days
Microsoft released updates for 80 vulnerabilities on September 2025 Patch Tuesday. None of these vulnerabilities were zero-days. The updates address eight critical flaws, including five remote code execution vulnerabilities, one information disclosure, and two elevation of privilege vulnerabilities. The vulnerabilities span various categories: 38 elevation of privilege, 2 security feature bypass, 22 remote code execution, 14 information disclosure, 3 denial of service, and 1 spoofing. One zero-day vulnerability was fixed in Windows SMB Server. The updates also include hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing. The patch includes 38 elevation of privilege vulnerabilities, the highest number among all categories. CVE-2025-54918 is an EoP vulnerability in Windows NT LAN Manager (NTLM) marked as critical. CVE-2025-54111 and CVE-2025-54913 are EoP flaws in Windows UI XAML, allowing privilege escalation via phished credentials or malicious Microsoft Store apps. CVE-2025-55232 is an RCE vulnerability in the Microsoft High Performance Compute (HPC) Pack with a CVSS score of 9.8. CVE-2025-54916 is an RCE vulnerability in Windows NTFS that can be triggered by authenticated users. Microsoft's patch update includes recommendations for preparing for the end-of-life of Windows 10 and mandatory multifactor authentication (MFA) for Azure in October 2025.